Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 289 discussion

Actual exam question from ISC's CISSP
Question #: 289
Topic #: 1
[All CISSP Questions]

A system developer has a requirement for an application to check for a secure digital signature before the application is accessed on a user's laptop. Which security mechanism addresses this requirement?

  • A. Trusted Platform Module (TPM)
  • B. Certificate revocation list (CRL) policy
  • C. Key exchange
  • D. Hardware encryption
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
1460168
3 months, 3 weeks ago
Selected Answer: A
It is A. It can not be b, because certification management was not asked. CRL is Revocation List only.
upvoted 1 times
...
CCNPWILL
5 months, 3 weeks ago
Selected Answer: A
A is correct. B... just because you guys hear " policy " and click it... read closer and stop trying gimmicks to get answers correct. TPM is where cert related mechanisms are found. not in a ' policy '
upvoted 3 times
...
Hongjun
7 months, 3 weeks ago
Selected Answer: A
check for a secure digital signature , not check the status of digital signature ~ Key Usage: Applications or processes running on the device can utilize TPM to perform cryptographic operations, including digital signature generation and verification. When generating a digital signature, the application can use the TPM-resident private key to sign the data, and when verifying a digital signature, the application can use the TPM to verify the signature against the corresponding public key stored in the TPM. above explain from GPT. TPM is the answer for this question.
upvoted 2 times
...
Hongjun
8 months ago
Selected Answer: A
B is not correct. CRLs and OCSP are 2 ways to obtain the revocation status of an X.509 digital certificate. refer question no.272. correct answer: A .
upvoted 2 times
...
GuardianAngel
9 months, 2 weeks ago
A TPM can be used for remote attestation, ensuring that a host is a known good state and hasn't been modified or tampered (from a hardware and a software perspective). TPMs can also seal and bind data to them, encrypting data against the TPM. This also allows it to be decrypted by the TPM, only if the machine is in a good and trusted state. https://quizlet.com/510817674/it-security-defense-against-the-digital-dark-arts-flash-cards/
upvoted 2 times
...
gjimenezf
10 months ago
Selected Answer: B
CRL policy, checks certificate revocation status
upvoted 1 times
...
YesPlease
11 months, 1 week ago
Selected Answer: B
Answer B) Certificate revocation list (CRL) policy The question is asking to check for a "secure digital signature". "Secure" is referring to valid/Up-to-date and not just having any "digital certificate". There is literally a Group Policy in Windows to check for digital certificates: https://admx.help/?Category=InternetExplorer&Policy=Microsoft.Policies.InternetExplorer::Advanced_CertificateRevocation More reading on how CRL is used with software: https://public.cyber.mil/pki-pke/admins/#toggle-id-3:~:text=Applications%20must%20verify%20certificates%20have%20not%20been%20revoked%20prior%20to%20relying%20on%20them%20for%20security%20functions%20such%20as%20authentication.
upvoted 2 times
YesPlease
11 months, 1 week ago
Also, the question isn't stating that the laptop needs to have a valid certificate, but the app itself should have a valid certificate before opening. That way it won't allow people using it if its encryption isn't valid/working.
upvoted 1 times
...
...
InclusiveSTEAM
1 year, 1 month ago
The answer is A: A TPM provides tamper-resistant hardware-based secure storage for keys/measurements needed to validate signatures or hashes before allowing access on a device. -A certificate revocation list policy manages revoked certificates but does not perform verification itself. -Key exchange and hardware encryption facilitate secure communication but do not explicitly handle pre-access digital signature validation which is the stated need. TPMs can securely store and use device keys needed to check valid signatures and hashes before launching apps or firmware.
upvoted 2 times
...
HughJassole
1 year, 4 months ago
B. The question asks for "to check for a secure digital signature". So checking for the signature. https://www.keyfactor.com/blog/what-is-a-certificate-revocation-list-crl-vs-ocsp/
upvoted 1 times
...
oudmaster
1 year, 11 months ago
Selected Answer: B
What I understood from the question: The laptop has to validate the application digital signature (which is usually over a trusted signed digital certificate that carries the digital signature), before permit the access. In this case, Option B is the right answer.
upvoted 2 times
oudmaster
1 year, 10 months ago
Seems TPM can perform Digital Signature Operations: TPM is a smartcard-like module on the motherboard performing cryptographic functions and digital signature operations. It can create, store and manage user keys. It is protected against attacks. Ref: https://docs.sophos.com/esg/sgn/8-2/admin/en-us/esg/SafeGuard-Enterprise/concepts/BitLockerAuthenticationTPM.html#:~:text=TPM%20is%20a%20smartcard%2Dlike,It%20is%20protected%20against%20attacks.
upvoted 1 times
...
oudmaster
1 year, 10 months ago
How to perform digital signature with TPM: https://wiki.st.com/stm32mpu/wiki/STPM4RasPI_expansion_board
upvoted 1 times
...
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
Toa
2 years ago
Answer B A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date. It is a type of blocklist that includes certificates that should no longer be trusted and is used by various endpoints, including web browsers, to verify if a certificate is valid and trustworthy. The CRL file is signed by the CA to prevent tampering. What is a digital certificate? Digital certificates are used in the encryption process to secure communications and create trust in online transactions -- most often, by using the Transport Layer Security/Secure Sockets Layer (TLS/SSL) protocol. The certificate, which is signed by the issuing CA, also provides proof of the certificate owner's identity. https://www.techtarget.com/searchsecurity/definition/Certificate-Revocation-List
upvoted 1 times
...
rdy4u
2 years ago
Selected Answer: A
TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop).
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...